[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

ID Based Cryptography and Anonymity in Delay/Disruption Tolerant Networks

  • Conference paper
Personal Satellite Services (PSATS 2010)

Abstract

Due to the rapid development in technology, every network, application needs full time connectivity without disruption and delays. The Delay/Disruption Tolerant Networking (DTN) concept is suitable for applications such as rural and disaster areas networks, animal and environmental monitoring plus others. However, due to the shared and unsecured nature of such challenged networks a good cryptographic framework needed in DTN. Identity Based Cryptography (IBC) compares favorably with traditional public key cryptography while generating public key on a fly as required. In this paper, we will provide anonymity solution in DTN using IBC. This has the advantage over public key cryptography with respect to end-to-end confidentiality. Also we use pseudonyms to provide anonymity and hide the identity of the end user.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 35.99
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 44.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Cerf, V., et al.: Delay Tolerant Networking Architecture. IETF, Network Working Group, RFC 4838 (2007)

    Google Scholar 

  2. Fall, K.: A Delay Tolerant Network for Challenging Internet. In: SIGCOMM 2003 Conference on Application, Technologies, Architecture and Protocol for Computer communication, pp. 27–34 (2003)

    Google Scholar 

  3. Warthman, F.: A Tutorial Delay Tolerant Networks (DTNs). V 1.1, DTNRG (2003)

    Google Scholar 

  4. Scott, K., Burleigh, S.: Bundle Protocol Specification. IETF, Network Working Group, RFC 5050 (2007)

    Google Scholar 

  5. Farrell, S., Cahill, V.: Security consideration in space and delay tolerant networks. In: Second IEEE international conference, Space mission challenges for information technology, SMC-IT (2006)

    Google Scholar 

  6. Fall, K., Chakrabarthi, A.: Identity Based Cryptography for Delay Tolerant Networking (2003), http://edify.cse.lehigh.edu/EdifyTeam/edifyTeamDocs/dtn_sec.pdf

  7. Symington, S.F., et al.: Bundle Security Protocol Specification. draft-irtf-dtnrg-bundle-security-08, IETF draft (2008)

    Google Scholar 

  8. Farrell, S., et al.: Delay-Tolerant Networking Security Overview. draft-irtf-dtnrg-sec-overview-06, IETF draft (2009)

    Google Scholar 

  9. Bhutta, M., Johnson, E., Ansa, G., Ahmed, N., Alsiyabi, M., Cruickshank, H.: Security Analysis for Delay/Disruption Tolerant Satellite and Sensor Networks. In: IWSSC 2009, Siena, Italy (September 2009)

    Google Scholar 

  10. Farrell, S., Cahill, V.: Delay and Disruption Tolerant Network (2006), ISBN. 1-59693-063-2

    Google Scholar 

  11. Weise, J.: Public Key Infrastructure Overview. Sun Blue Prints (2001)

    Google Scholar 

  12. Asokan, N., et al.: Applicability of Identity Based Cryptography in Disruption Tolerant Network. In: 1st international MobiSys workshop on mobile oppurtunistics networking, MobiOpp 2007, pp. 52–56 (2007)

    Google Scholar 

  13. Shamir, A.: Identity based cryptosystem and signature scheme. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  14. Gagne, M.: Identity based encryption: A survey. RSA Labortries, Cryptobytes 6 (2003)

    Google Scholar 

  15. Baek, J., et al.: A survey of Identity based cryptography. In: Proc. of Australian Unix Users Group Annual Conference (2004)

    Google Scholar 

  16. Boneh, D., Franklin, M.K.: Identity-based encryption from the weil pairing. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 213–229. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  17. Seth, A., Keshav, S.: Particle security for disconnected nodes. In: First workshop on Secure Network Protocols (NPSec), pp. 31–36 (2005)

    Google Scholar 

  18. Farrell, S., Symington, S., Weiss, H.: Delay Tolerant Network Security overview. Draft-irtf-dtnrg-sec-overview-08, IRTF (2008)

    Google Scholar 

  19. Pfitzmann, A., Hansen, M.: Anonymity, unlinkability, undetectability, unobservability, pseudonymity and identity management- A consolidated proposal for terminology (2008), http://dud.inf.tudresden.de/AnonTerminology.shtml

  20. Chaum, D.: Untraceable electronic email, return address and digital pseudonym. Communication of the ACM (1981)

    Google Scholar 

  21. Reed, M.G., et al.: Anonymous connection and onion routing. IEEE journal on selected areas in communication, 482–494 (1998)

    Google Scholar 

  22. Danezis, G., Diaz, C.: A survey of anonymous communication channels. Journal of Privacy technology (2008)

    Google Scholar 

  23. Kate, A., et al.: Anonymity and security in delay tolerant networks. In: third international conference on security and privacy, SecureComm 2007 (2007)

    Google Scholar 

  24. Lynn, B.: Paring Based Cryptography (PBC) library, http://crypto.stanford.edu/pbc/

  25. DTN Research group, http://www.dtnrg.org/wiki/Code

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Ahmad, N., Cruickshank, H., Sun, Z. (2010). ID Based Cryptography and Anonymity in Delay/Disruption Tolerant Networks. In: Sithamparanathan, K., Marchese, M., Ruggieri, M., Bisio, I. (eds) Personal Satellite Services. PSATS 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 43. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13618-4_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-13618-4_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-13617-7

  • Online ISBN: 978-3-642-13618-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics